Mining Network Traffic Data

Size: px
Start display at page:

Download "Mining Network Traffic Data"

Transcription

1 Miig Network Traffic Data Ljiljaa Trajković Commuicatio Networks Laboratory School of Egieerig Sciece Simo Fraser Uiversity, Vacouver, British Columbia Caada Natioal Ceter for High-Performace Computig, Taia, Taiwa

2 Simo Fraser Uiversity, Buraby Campus Natioal Ceter for High-Performace Computig, Taia, Taiwa

3 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios Natioal Ceter for High-Performace Computig, Taia, Taiwa

4 lhr: 535,102 odes ad 601,678 liks Natioal Ceter for High-Performace Computig, Taia, Taiwa

5 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios Natioal Ceter for High-Performace Computig, Taia, Taiwa

6 Measuremets of etwork traffic Traffic measuremets: help uderstad characteristics of etwork traffic are basis for developig traffic models are used to evaluate performace of protocols ad applicatios Traffic aalysis: provides iformatio about the etwork usage helps uderstad the behavior of etwork users Traffic predictio: importat to assess future etwork capacity requiremets used to pla future etwork developmets Natioal Ceter for High-Performace Computig, Taia, Taiwa

7 Traffic modelig: self-similarity Self-similarity implies a fractal-like behavior Data o various time scales have similar patters Implicatios: o atural legth of bursts bursts exist across may time scales traffic does ot become smoother whe aggregated (ulike Poisso traffic) it is ulike Poisso traffic used to model traffic i telephoe etworks as the traffic volume icreases, the traffic becomes more bursty ad more self-similar Natioal Ceter for High-Performace Computig, Taia, Taiwa

8 Self-similarity Self-similarity implies a fractal-like behavior: data o various time scales have similar patters A wide-sese statioary process X() is called (exactly secod order) self-similar if its autocorrelatio fuctio satisfies: r (m) (k) = r(k), k 0, m = 1, 2,,, where m is the level of aggregatio Natioal Ceter for High-Performace Computig, Taia, Taiwa

9 Self-similar processes Properties: slowly decayig variace log-rage depedece Hurst parameter (H) Processes with oly short-rage depedece (Poisso): H = 0.5 Self-similar processes: 0.5 < H < 1.0 As the traffic volume icreases, the traffic becomes more bursty, more self-similar, ad the Hurst parameter icreases Natioal Ceter for High-Performace Computig, Taia, Taiwa

10 Self-similarity: ifluece of time-scales Geuie MPEG traffic trace E+06 5.E E+05 4.E+06 bits/time uit bits/time uit 6.E+05 4.E+05 bits/time uit 3.E+06 2.E E+05 1.E time uit = 160 ms (4 frames) 0.E time uit = 640 ms (16 frames) 0.E time uit = 2560 ms (64 frames) W. E. Lelad, M. S. Taqqu, W. Williger, ad D. V. Wilso, O the self-similar ature of Etheret traffic (exteded versio), IEEE/ACM Tras. Netw., vol. 2, o 1, pp. 1-15, Feb Natioal Ceter for High-Performace Computig, Taia, Taiwa

11 Self-similarity: ifluece of time-scales Sythetically geerated Poisso model E+06 5.E E+05 4.E+06 bits/time uit bits/time uit 6.E+05 4.E+05 bits/time uit 3.E+06 2.E E+05 1.E time uit = 160 ms (4 frames) 0.E time uit = 640 ms (16 frames) 0.E time uit = 2560 ms (64 frames) W. E. Lelad, M. S. Taqqu, W. Williger, ad D. V. Wilso, O the self-similar ature of Etheret traffic (exteded versio), IEEE/ACM Tras. Netw., vol. 2, o 1, pp. 1-15, Feb Natioal Ceter for High-Performace Computig, Taia, Taiwa

12 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios Natioal Ceter for High-Performace Computig, Taia, Taiwa

13 Case study: BCNET packet capture BCNET is the hub of advaced telecommuicatio etwork i British Columbia, Caada that offers services to research ad higher educatio istitutios Natioal Ceter for High-Performace Computig, Taia, Taiwa

14 BCNET packet capture BCNET trasits have two service providers with 10 Gbps etwork liks ad oe service provider with 1 Gbps etwork lik Optical Test Access Poit (TAP) splits the sigal ito two distict paths The sigal splittig ratio from TAP may be modified The Data Capture Device (NijaBox 5000) collects the real-time data (packets) from the traffic filterig device Natioal Ceter for High-Performace Computig, Taia, Taiwa

15 Net Optics Director 7400: applicatio diagram Net Optics Director 7400 is used for BCNET traffic filterig It directs traffic to moitorig tools such as NijaBox 5000 ad FlowMo Natioal Ceter for High-Performace Computig, Taia, Taiwa

16 Network moitorig ad aalyzig: Edace card Edace Data Acquisitio ad Geeratio (DAG) 5.2X card resides iside the NijaBox 5000 It captures ad trasmits traffic ad has time-stampig capability DAG 5.2X is a sigle port Peripheral Compoet Itercoect Exteded (PCIx) card ad is capable of capturig o average Etheret traffic of 6.9 Gbps Natioal Ceter for High-Performace Computig, Taia, Taiwa

17 Real time etwork usage by BCNET members The BCNET etwork is high-speed fiber optic research etwork British Columbia's etwork exteds to 1,400 km ad coects Kamloops, Kelowa, Price George, Vacouver, ad Victoria Natioal Ceter for High-Performace Computig, Taia, Taiwa

18 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios Natioal Ceter for High-Performace Computig, Taia, Taiwa

19 Case study: E-Comm etwork E-Comm etwork: a operatioal truked radio system servig as a regioal emergecy commuicatio system The E-Comm etwork is capable of both voice ad data trasmissios Voice traffic accouts for over 99% of etwork traffic A group call is a stadard call made i a truked radio system More tha 85% of calls are group calls A distributed evet log database records every evet occurrig i the etwork: call establishmet, chael assigmet, call drop, ad emergecy call Natioal Ceter for High-Performace Computig, Taia, Taiwa

20 E-Comm etwork Natioal Ceter for High-Performace Computig, Taia, Taiwa

21 E-Comm etwork architecture Users Trasmitters/Repeaters PSTN PBX Dispatch cosole * 8 # Vacouver I B M Network switch Other EDACS systems Buraby Database server Data gateway Maagemet cosole Natioal Ceter for High-Performace Computig, Taia, Taiwa

22 Traffic data 2001 data set: 2 days of traffic data to (110,348 calls) 2002 data set: 28 days of cotiuous traffic data to (1,916,943 calls) 2003 data set: 92 days of cotiuous traffic data to (8,756,930 calls) Natioal Ceter for High-Performace Computig, Taia, Taiwa

23 Observatios Presece of daily cycles: miimum utilizatio: ~ 2 PM maximum utilizatio: 9 PM to 3 AM 2002 sample data: cell 5 is the busiest others seldom reach their capacities 2003 sample data: several cells (2, 4, 7, ad 9) have all chaels occupied durig busy hours Natioal Ceter for High-Performace Computig, Taia, Taiwa

24 Call arrival rate i 2002 ad 2003: cyclic patters Number of calls Time (hours) 2002 Data 2003 Data the busiest hour is aroud midight the busiest day is Thursday Number of calls 12 x 104 Sat. Su. Mo. Tue. Wed. Thu. Fri. Time (days) useful for schedulig periodical maiteace tasks Data 2003 Data Natioal Ceter for High-Performace Computig, Taia, Taiwa

25 Modelig ad characterizatio of traffic We aalyzed voice traffic from a public safety wireless etwork i Vacouver, BC call iter-arrival ad call holdig times durig five busy hours from each year (2001, 2002, 2003) Statistical distributio ad the autocorrelatio fuctio of the traffic traces: Kolmogorov-Smirov goodess-of-fit test autocorrelatio fuctios wavelet-based estimatio of the Hurst parameter B. Vujičić, N. Cackov, S. Vujičić, ad Lj. Trajković, Modelig ad characterizatio of traffic i public safety wireless etworks, i Proc. SPECTS 2005, Philadelphia, PA, July 2005, pp Natioal Ceter for High-Performace Computig, Taia, Taiwa

26 Erlag traffic models Erlag B Erlag C N N A A N P N! B = P! N x C = N N A N 1 x N A A A N + x! x! N! N A x= 0 x= 0 P B : probability of rejectig a call P c : probability of delayig a call N : umber of chaels/lies A : total traffic volume Natioal Ceter for High-Performace Computig, Taia, Taiwa

27 Hourly traces Call holdig ad call iter-arrival times from the five busiest hours i each dataset (2001, 2002, ad 2003) Day/hour No. Day/hour No. Day/hour No :00 16: :00 01: :00 17: :00 20: :00 21:00 3,718 3,707 3,492 3,312 3, :00 05: :00 23: :00 24: :00 01: :00 01:00 4,436 4,314 4,179 3,971 3, :00 23: :00 24: :00 24: :00 03: :00 02:00 4,919 4,249 4,222 4,150 4,097 Natioal Ceter for High-Performace Computig, Taia, Taiwa

28 Statistical distributios Fourtee cadidate distributios: expoetial, Weibull, gamma, ormal, logormal, logistic, log-logistic, Nakagami, Rayleigh, Ricia, t-locatio scale, Birbaum-Sauders, extreme value, iverse Gaussia Parameters of the distributios: calculated by performig maximum likelihood estimatio Best fittig distributios are determied by: visual ispectio of the distributio of the trace ad the cadidate distributios Kolmogorov-Smirov test of potetial cadidates Natioal Ceter for High-Performace Computig, Taia, Taiwa

29 Call iter-arrival times: pdf cadidates Probability desity Traffic data Expoetial model Logormal model Weibull model Gamma model Rayleigh model Normal model Call iter-arrival time (s) Natioal Ceter for High-Performace Computig, Taia, Taiwa

30 Call iter-arrival times: K-S test results (2003 data) Distributio Expoetial Weibull Gamma Logormal Parameter , 22:00 23: , 23:00 24: , 23:00 24: , 02:00 03: , 01:00 02:00 h p k h p k h p k h p 1.015E E E E E-21 k Natioal Ceter for High-Performace Computig, Taia, Taiwa

31 Call iter-arrival times: estimates of H Traces pass the test for time costacy of a: estimates of H are reliable Day/hour H Day/hour H Day/hour H :00 16: :00 01: :00 17: :00 20: :00 21: :00 05: :00 23: :00 24: :00 01: :00 01: :00 23: :00 24: :00 24: :00 03: :00 02: Natioal Ceter for High-Performace Computig, Taia, Taiwa

32 Call holdig times: pdf cadidates Probability desity Traffic data Logormal model Gamma model Weibull model Expoetial model Normal model Rayleigh model Call holdig time (s) Natioal Ceter for High-Performace Computig, Taia, Taiwa

33 Call holdig times: estimates of H All (except oe) traces pass the test for costacy of a oly oe ureliable estimate (*): cosistet value Day/hour H Day/hour H Day/hour H :00 16: :00 05: :00 23: :00 01: :00 23: :00 24: :00 17: :00 24: :00 24: * :00 20: :00 01: :00 03: :00 21: :00 01: :00 02: Natioal Ceter for High-Performace Computig, Taia, Taiwa

34 Call iter-arrival ad call holdig times Day/hour Avg. (s) Day/hour Avg. (s) Day/hour Avg. (s) iter-arrival holdig 15:00 16: :00 05: :00 23: iter-arrival holdig 00:00 01: :00 23: :00 24: iter-arrival holdig 16:00 17: :00 24: :00 24: iter-arrival holdig 19:00 20: :00 01: :00 03: iter-arrival holdig 20:00 21: :00 01: :00 02: Avg. call iter-arrival times: 1.08 s (2001), 0.86 s (2002), 0.84 s (2003) Avg. call holdig times: 3.91 s (2001), 3.96 s (2002), 4.13 s (2003) Natioal Ceter for High-Performace Computig, Taia, Taiwa

35 Busy hour: best fittig distributios Distributio Busy hour Call iter-arrival times Call holdig times Weibull Gamma Logormal a b a b µ σ :00 16: :00 01: :00 17: :00 05: :00 23: :00 24: :00 23: :00 24: :00 24: Natioal Ceter for High-Performace Computig, Taia, Taiwa

36 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios Natioal Ceter for High-Performace Computig, Taia, Taiwa

37 Case study: ChiaSat DirecPC system Natioal Ceter for High-Performace Computig, Taia, Taiwa

38 Network ad traffic data ChiaSat: etwork architecture ad TCP Aalysis of billig records: aggregated traffic user behavior Aalysis of tcpdump traces: geeral characteristics TCP optios ad operatig system (OS) figerpritig etwork aomalies Natioal Ceter for High-Performace Computig, Taia, Taiwa

39 Characteristics of satellite liks ChiaSat hybrid satellite etwork Employs geosychrous satellites deployed by Hughes Network Systems Ic. Provides data ad televisio services: DirecPC (Classic): uidirectioal satellite data service DirecTV: satellite televisio service DirecWay (Hughet): ew bi-directioal satellite data service that replaces DirecPC DirecPC trasmissio rates: 400 kb/s from satellite to user 33.6 kb/s from user to etwork operatios ceter (NOC) usig dial-up Improves performace usig TCP splittig with spoofig Natioal Ceter for High-Performace Computig, Taia, Taiwa

40 ChiaSat data: aalysis ChiaSat traffic is self-similar ad o-statioary Hurst parameter differs depedig o traffic load Modelig of TCP coectios: iter-arrival time is best modeled by the Weibull distributio umber of dowloaded bytes is best modeled by the logormal distributio The distributio of visited websites is best modeled by the discrete Gaussia expoetial (DGX) distributio Natioal Ceter for High-Performace Computig, Taia, Taiwa

41 ChiaSat data: aalysis Traffic predictio: autoregressive itegrative movig average (ARIMA) was successfully used to predict uploaded traffic (but ot dowloaded traffic) wavelet + autoregressive model outperforms the ARIMA model Q. Shao ad Lj. Trajkovic, Measuremet ad aalysis of traffic i a hybrid satellite-terrestrial etwork, Proc. SPECTS 2004, Sa Jose, CA, July 2004, pp Natioal Ceter for High-Performace Computig, Taia, Taiwa

42 Aalysis of collected data Aalysis of patters ad statistical properties of two sets of data from the ChiaSat DirecPC etwork: billig records tcpdump traces Billig records: daily ad weekly traffic patters user classificatio: sigle ad multi-variable k-meas clusterig based o average traffic hierarchical clusterig based o user activity Natioal Ceter for High-Performace Computig, Taia, Taiwa

43 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios Natioal Ceter for High-Performace Computig, Taia, Taiwa

44 Iteret topology Iteret is a etwork of Autoomous Systems: groups of etworks sharig the same routig policy idetified with Autoomous System Numbers (ASN) Autoomous System Numbers: assigmets/as-umbers Iteret topology o AS-level: the arragemet of ASes ad their itercoectios Aalyzig the Iteret topology ad fidig properties of associated graphs rely o miig data ad capturig iformatio about Autoomous Systems (ASes) Natioal Ceter for High-Performace Computig, Taia, Taiwa

45 Variety of graphs Radom graphs: odes ad edges are geerated by a radom process Erdős ad Réyi model Small world graphs: odes ad edges are geerated so that most of the odes are coected by a small umber of odes i betwee Watts ad Strogatz model (1998) Natioal Ceter for High-Performace Computig, Taia, Taiwa

46 Scale-free graphs Scale-free graphs: graphs whose ode degree distributio follow power-law rich get richer Barabási ad Albert model (1999) Aalysis of complex etworks: discovery of spectral properties of graphs costructig matrices describig the etwork coectivity Natioal Ceter for High-Performace Computig, Taia, Taiwa 46

47 Aalyzed datasets Sample datasets: Route Views: TABLE_DUMP B / IGP : : : :3000 NAG RIPE: TABLE_DUMP B / IGP : :3010 NAG Natioal Ceter for High-Performace Computig, Taia, Taiwa 47

48 Iteret topology at AS level Datasets collected from Border Gateway Protocols (BGP) routig tables are used to ifer the Iteret topology at AS-level Natioal Ceter for High-Performace Computig, Taia, Taiwa 48

49 Iteret topology The Iteret topology is characterized by the presece of various power-laws: ode degree vs. ode rak eigevalues of the matrices describig Iteret graphs (adjacecy matrix ad ormalized Laplacia matrix) Power-laws expoets have ot sigificatly chaged over the years Spectral aalysis reveals ew historical treds ad otable chages i the coectivity ad clusterig of AS odes over the years Natioal Ceter for High-Performace Computig, Taia, Taiwa

50 Traffic aomalies Slammer, Nimda, ad Code Red I aomalies affected performace of the Iteret Border Gateway Protocol (BGP) BGP aomalies also iclude: Iteret Protocol (IP) prefix hijacks, miss-cofiguratios, ad electrical failures Techiques for detectig BGP aomalies have recetly gaied visible attetio ad importace Natioal Ceter for High-Performace Computig, Taia, Taiwa

51 Aomaly detectio techiques Classificatio problem: assigig a aomaly or regular label to a data poit Accuracy of a classifier depeds o: extracted features combiatio of selected features uderlyig model Goal: Detect Iteret routig aomalies usig the Border Gateway Protocol (BGP) update messages Natioal Ceter for High-Performace Computig, Taia, Taiwa

52 BGP features Approach: Defie a set of 37 features based o BGP update messages Extract the features from available BGP update messages that are collected durig the time period whe the Iteret experieced aomalies: Slammer Nimda Code Red I Natioal Ceter for High-Performace Computig, Taia, Taiwa

53 Feature selectio Select the most relevat features for classificatio usig: Fisher Miimum Redudacy Maximum Relevace (mrmr) Odds Ratio Decisio Tree Fuzzy Rough Sets Natioal Ceter for High-Performace Computig, Taia, Taiwa

54 Aomaly classificatio Trai classifiers for BGP aomaly detectio usig: Support Vector Machies Hidde Markov Models Naive Bayes Decisio Tree Extreme Learig Machie (ELM) Natioal Ceter for High-Performace Computig, Taia, Taiwa

55 Feature extractio: BGP messages Border Gateway Protocol (BGP) eables exchage of routig iformatio betwee gateway routers usig update messages BGP update message collectios: Réseaux IP Europées (RIPE) uder the Routig Iformatio Service (RIS) project Route Views Available i multi-threaded routig toolkit (MRT) biary format Natioal Ceter for High-Performace Computig, Taia, Taiwa

56 BGP: kow aomalies Aomaly Date Duratio (h) Slammer Jauary 25, Nimda September 18, Code Red I July 19, Traiig Data Dataset Slammer + Nimda Dataset 1 Slammer + Code Red I Dataset 2 Code Red I + Nimda Dataset 3 Slammer Dataset 4 Nimda Dataset 5 Code Red I Dataset 6 Natioal Ceter for High-Performace Computig, Taia, Taiwa

57 Slammer worm Seds its replica to radomly geerated IP addresses Destiatio IP address gets ifected if: or it is a Microsoft SQL server a persoal computer with the Microsoft SQL Server Data Egie (MSDE) Natioal Ceter for High-Performace Computig, Taia, Taiwa

58 Nimda worm Propagates through messages, web browsers, ad file systems Viewig the message triggers the worm payload The worm modifies the cotet of the web documet files i the ifected hosts ad copies itself i all local host directories Natioal Ceter for High-Performace Computig, Taia, Taiwa

59 Code Red I worm Takes advatage of vulerability i the Microsoft Iteret Iformatio Services (IIS) idexig software It triggers a buffer overflow i the ifected hosts by writig to the buffers without checkig their limit Natioal Ceter for High-Performace Computig, Taia, Taiwa

60 Feature extractio: BGP messages Defie 37 features Sample every miute durig a five-day period: the peak day of a aomaly two days prior ad two days after the peak day 7,200 samples for each aomalous evet: 5,760 regular samples (o-aomalous) 1,440 aomalous samples Imbalaced dataset Natioal Ceter for High-Performace Computig, Taia, Taiwa

61 BGP features Feature Defiitio Category 1 Number of aoucemets Volume 2 Number of withdrawals Volume 3 Number of aouced NLRI prefixes Volume 4 Number of withdraw NLRI prefixes Volume 5 Average AS-PATH legth AS-path 6 Maximum AS-PATH legth AS-path 7 Average uique AS-PATH legth AS-path 8 Number of duplicate aoucemets Volume 9 Number of duplicate withdrawals Volume 10 Number of implicit withdrawals Volume Natioal Ceter for High-Performace Computig, Taia, Taiwa

62 BGP features Feature Defiitio Category 11 Average edit distace AS-path 12 Maximum edit distace AS-path 13 Iter-arrival time Maximum edit distace =, where = (7,..., 17) Maximum AS-path legth =, where = (7,..., 15) Volume AS-path AS-path 34 Number of IGP packets Volume 35 Number of EGP packets Volume 36 Number of icomplete packets Volume 37 Packet size (B) Volume Natioal Ceter for High-Performace Computig, Taia, Taiwa

63 Feature selectio algorithms Employed to select the most relevat features: Fisher Miimum Redudacy Maximum Relevace (mrmr) Odds Ratio Decisio Tree Fuzzy Rough Sets Natioal Ceter for High-Performace Computig, Taia, Taiwa

64 Feature selectio: decisio tree Dataset Traiig data Selected Features Dataset 1 Slammer + Nimda 1 21, 23 29, Dataset 2 Slammer + Code Red I 1 22, 24 29, Dataset 3 Code Red I + Nimda 1 29, Either four (30, 31, 32, 33) or five (22, 30, 31, 32, 33) features are removed i the costructed trees maily because: features are umerical ad some are used repeatedly Natioal Ceter for High-Performace Computig, Taia, Taiwa

65 Feature selectio: fuzzy rough sets Dataset Traiig data Selected Features Dataset 4 Slammer 1, 3 6, 9, 10, 13 32, 35 Dataset 5 Nimda 1, 3 4, 8 10, 12, 14 32, 35, 36 Dataset 6 Code Red I 3 4, 8 10, 12, 14 32, 35, 36 Usig combiatio of datasets, for example Slammer + Nimda for traiig leads to higher computatioal load Each dataset was used idividually Natioal Ceter for High-Performace Computig, Taia, Taiwa

66 Aomaly classificatio Trai classifiers for BGP aomaly detectio usig: Support Vector Machies Hidde Markov Models Naive Bayes Decisio Tree Extreme Learig Machie (ELM) Natioal Ceter for High-Performace Computig, Taia, Taiwa

67 Aomaly classifiers: decisio tree Dataset Testig data Acc trai Acc test Traiig time (s) Dataset 1 Code Red I Dataset 2 Nimda Dataset 3 Slammer Each path from the root ode to a leaf ode may be trasformed ito a decisio rule A set of rules that are obtaied from a traied decisio tree may be used for classifyig usee samples Natioal Ceter for High-Performace Computig, Taia, Taiwa

68 Aomaly classifiers: ELM No. of features Dataset Acc trai Acc Traiig time test (s) Dataset ± ± Dataset ± ± Dataset ± ± Dataset ± ± Dataset ± ± Dataset ± ± hidde uits The biary features are removed to form a set of 17 features Natioal Ceter for High-Performace Computig, Taia, Taiwa

69 Aomaly classifiers: ELM No. of features Dataset Acc trai Acc test 28 Dataset ± ± (from 37) Dataset ± ± Dataset ± ± Dataset ± ± (from 17) Dataset ± ± Dataset ± ± Natioal Ceter for High-Performace Computig, Taia, Taiwa

70 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios Natioal Ceter for High-Performace Computig, Taia, Taiwa

71 Coclusios Data collected from deployed etworks are used to: evaluate etwork performace characterize ad model traffic (iter-arrival ad call holdig times) idetify treds i the evolutio of the Iteret topology classify traffic ad etwork aomalies Natioal Ceter for High-Performace Computig, Taia, Taiwa

72 Refereces: sources of data RIPE RIS raw data [Olie]. Available: Uiversity of Orego Route Views project [Olie]. Available: CAIDA: Ceter for Applied Iteret Data Aalysis: [Olie]. Available: Natioal Ceter for High-Performace Computig, Taia, Taiwa

73 Refereces: M. Cosovic, S. Obradovic, ad Lj. Trajković, Performace evaluatio of BGP aomaly classifiers, i Proc. The Third Iteratioal Coferece o Digital Iformatio, Networkig, ad Wireless Commuicatios, DINWC 2015, Moscow, Russia, Feb. 2015, pp Y. Li, H. J. Xig, Q. Hua, X.-Z. Wag, P. Batta, S. Haeri, ad Lj. Trajković, Classificatio of BGP aomalies usig decisio trees ad fuzzy rough sets," to be preseted at IEEE Iteratioal Coferece o Systems, Ma, ad Cyberetics, SMC 2014, Sa Diego, CA, October N. Al-Rousa, S. Haeri, ad Lj. Trajković, Feature selectio for classificatio of BGP aomalies usig Bayesia models," i Proc. Iteratioal Coferece o Machie Learig ad Cyberetics, ICMLC 2012, Xi'a, Chia, July 2012, pp N. Al-Rousa ad Lj. Trajković, Machie learig models for classificatio of BGP aomalies, i Proc. IEEE Cof. High Performace Switchig ad Routig, HPSR 2012, Belgrade, Serbia, Jue 2012, pp T. Farah, S. Lally, R. Gill, N. Al-Rousa, R. Paul, D. Xu, ad Lj. Trajković, Collectio of BCNET BGP traffic," i Proc. 23rd ITC, Sa Fracisco, CA, USA, Sept. 2011, pp S. Lally, T. Farah, R. Gill, R. Paul, N. Al-Rousa, ad Lj. Trajković, Collectio ad characterizatio of BCNET BGP traffic," i Proc IEEE Pacific Rim Cof. Commuicatios, Computers ad Sigal Processig, Victoria, BC, Caada, Aug. 2011, pp Natioal Ceter for High-Performace Computig, Taia, Taiwa

74 lhr: 535,102 odes ad 601,678 liks Natioal Ceter for High-Performace Computig, Taia, Taiwa

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser

More information

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser

More information

Mining Network Traffic Data

Mining Network Traffic Data Miig Network Traffic Data Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver, British Columbia Caada Natioal

More information

Data Mining and Machine Learning for Analysis of Network Traffic

Data Mining and Machine Learning for Analysis of Network Traffic Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,

More information

Data Mining and Machine Learning for Analysis of Network Traffic

Data Mining and Machine Learning for Analysis of Network Traffic Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,

More information

Data Mining and Machine Learning for Analysis of Network Traffic

Data Mining and Machine Learning for Analysis of Network Traffic Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,

More information

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies Evaluatio of Support Vector Machie Kerels for Detectig Network Aomalies Prera Batta, Maider Sigh, Zhida Li, Qigye Dig, ad Ljiljaa Trajković Commuicatio Networks Laboratory http://www.esc.sfu.ca/~ljilja/cl/

More information

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser

More information

Complex Networks: Traffic Data, Network Topologies, and Routing Anomalies

Complex Networks: Traffic Data, Network Topologies, and Routing Anomalies Complex Networks: Traffic Data, Network Topologies, and Routing Anomalies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science

More information

Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets

Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets Yan Li, Hong-Jie Xing, Qiang Hua, Xi-Zhao Wang, Prerna Batta, Soroush Haeri, and Ljiljana Trajković Hebei University, Baoding,

More information

Mining Network Traffic Data

Mining Network Traffic Data Mining Network Traffic Data Ljiljana Trajkovic ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl April 2008 BCNET 2008 Advanced Networks Conference Roadmap Introduction Traffic

More information

Resource Public Key Infrastructure for Secure Border Gateway Protocol

Resource Public Key Infrastructure for Secure Border Gateway Protocol Resource Public Key Ifrastructure for Secure Border Gateway Protocol George Chag, Majid Ariaezhad, ad Ljiljaa Trajković gkchag@sfu.ca, ariaezhad@live.com, ljilja@sfu.ca Commuicatio Networks Laboratory

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Collection and Characterization of BCNET BGP Traffic

Collection and Characterization of BCNET BGP Traffic Collection and Characterization of BCNET BGP Traffic Sukhchandan Lally, Tanjila Farah, Rajvir Gill, Ravinder Paul, Nabil Al-Rousan, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia,

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

Designing a learning system

Designing a learning system CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Mining from Quantitative Data with Linguistic Minimum Supports and Confidences

Mining from Quantitative Data with Linguistic Minimum Supports and Confidences Miig from Quatitative Data with Liguistic Miimum Supports ad Cofideces Tzug-Pei Hog, Mig-Jer Chiag ad Shyue-Liag Wag Departmet of Electrical Egieerig Natioal Uiversity of Kaohsiug Kaohsiug, 8, Taiwa, R.O.C.

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

TCP session analysis and modeling of hybrid satellite-terrestrial Internet traffic

TCP session analysis and modeling of hybrid satellite-terrestrial Internet traffic TCP session analysis and modeling of hybrid satellite-terrestrial Internet traffic Savio Lau saviol@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network Itrusio Detectio usig Fuzzy Clusterig ad Artificial Neural Network Shraddha Suraa Research Scholar, Departmet of Computer Egieerig, Vishwakarma Istitute of Techology, Pue Idia shraddha.suraa@gmail.com

More information

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network America Joural of Itelliget Systems 206, 6(2): 42-47 DOI: 0.5923/j.ajis.2060602.02 Probabilistic Fuzzy Time Series Method Based o Artificial Neural Network Erol Egrioglu,*, Ere Bas, Cagdas Haka Aladag

More information

Our Learning Problem, Again

Our Learning Problem, Again Noparametric Desity Estimatio Matthew Stoe CS 520, Sprig 2000 Lecture 6 Our Learig Problem, Agai Use traiig data to estimate ukow probabilities ad probability desity fuctios So far, we have depeded o describig

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Mining Network Traffic Data

Mining Network Traffic Data Mining Network Traffic Data Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British Columbia

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Collection and Characterization of BCNET BGP Traffic

Collection and Characterization of BCNET BGP Traffic Collection and Characterization of BCNET BGP Traffic Sukhchandan Lally lally@sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl School of Engineering Science Simon Fraser University

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7)

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7) The Way of Calculatig The Traffic... THE WAY OF CALCULATIG THE TRAFFIC AD SIGALIG ETWORK DIMESIO OF COMMO CHAEL SIGALIG O.7 (CCS7) Departeme Tekik Elektro, Fakultas Tekik, Uiversitas Sumatera Utara Abstract:

More information

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees. Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

CORD Test Project in Okinawa Open Laboratory

CORD Test Project in Okinawa Open Laboratory CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article Available olie www.jocpr.com Joural of Chemical ad Pharmaceutical Research, 2013, 5(12):745-749 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 K-meas algorithm i the optimal iitial cetroids based

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

New Fuzzy Color Clustering Algorithm Based on hsl Similarity

New Fuzzy Color Clustering Algorithm Based on hsl Similarity IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Study on effective detection method for specific data of large database LI Jin-feng

Study on effective detection method for specific data of large database LI Jin-feng Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 205) Study o effective detectio method for specific data of large database LI Ji-feg (Vocatioal College of DogYig, Shadog

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory Cluster Aalysis Adrew Kusiak Itelliget Systems Laboratory 2139 Seamas Ceter The Uiversity of Iowa Iowa City, Iowa 52242-1527 adrew-kusiak@uiowa.edu http://www.icae.uiowa.edu/~akusiak Two geeric modes of

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Neuro Fuzzy Model for Human Face Expression Recognition

Neuro Fuzzy Model for Human Face Expression Recognition IOSR Joural of Computer Egieerig (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 2 (May-Jue 2012), PP 01-06 Neuro Fuzzy Model for Huma Face Expressio Recogitio Mr. Mayur S. Burage 1, Prof. S. V. Dhopte 2 1

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Designing a learning system

Designing a learning system CS 75 Itro to Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@pitt.edu 539 Seott Square, -5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS Roma Szewczyk Istitute of Metrology ad Biomedical Egieerig, Warsaw Uiversity of Techology E-mail:

More information

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani Uiversity of North Carolia at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS Overview Itroductio History of smart cards Types of smart cards Categories of smart cards Smart Card Stadards SLE4442

More information

What are Information Systems?

What are Information Systems? Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),

More information

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University CSCI 5090/7090- Machie Learig Sprig 018 Mehdi Allahyari Georgia Souther Uiversity Clusterig (slides borrowed from Tom Mitchell, Maria Floria Balca, Ali Borji, Ke Che) 1 Clusterig, Iformal Goals Goal: Automatically

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

Private Key Cryptography. TELE3119: Week2

Private Key Cryptography. TELE3119: Week2 Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i

More information

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Iteratioal Joural o Natural Laguage Computig (IJNLC) Vol. 2, No., February 203 EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Raj Kishor Bisht ad Ila Pat Bisht 2 Departmet of Computer Sciece &

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Feature Selection for Classification of BGP Anomalies using Bayesian Models

Feature Selection for Classification of BGP Anomalies using Bayesian Models July 17, 2012 11th International Conference on Machine Learning and Cybernetics, Xi an, China 1/ 32 Feature Selection for Classification of BGP Anomalies using Bayesian Models Nabil Al-Rousan, Soroush

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Lecture 13: Validation

Lecture 13: Validation Lecture 3: Validatio Resampli methods Holdout Cross Validatio Radom Subsampli -Fold Cross-Validatio Leave-oe-out The Bootstrap Bias ad variace estimatio Three-way data partitioi Itroductio to Patter Recoitio

More information

Criterion in selecting the clustering algorithm in Radial Basis Functional Link Nets

Criterion in selecting the clustering algorithm in Radial Basis Functional Link Nets WSEAS TRANSACTIONS o SYSTEMS Ag Sau Loog, Og Hog Choo, Low Heg Chi Criterio i selectig the clusterig algorithm i Radial Basis Fuctioal Lik Nets ANG SAU LOONG 1, ONG HONG CHOON 2 & LOW HENG CHIN 3 Departmet

More information

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 2012, Volume 5, No. 2, pp. 371-375 EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

More information

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Sharing Collections. Share a Collection via . Share a Collection via Google Classroom. Quick Reference Guide

Sharing Collections. Share a Collection via  . Share a Collection via Google Classroom. Quick Reference Guide Quick Referece Guide Share a Collectio via Email Sharig your collectio with others is a great way to collaborate. You ca easily sed a lik to your colleagues, studets, classmates ad frieds. Recipiets do

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

A Focused Crawler Based on Naive Bayes Classifier

A Focused Crawler Based on Naive Bayes Classifier Third Iteratioal Symposium o Itelliget Iformatio Techology ad Security Iformatics A Focused Crawler Based o Naive Bayes Classifier Wexia Wag, Xigshu Che*, Yogbi Zou Network ad Trusted Computig Istitute,

More information